On The Plausible Deniability Feature of Internet Protocols

@inproceedings{Mao2002OnTP,
  title={On The Plausible Deniability Feature of Internet Protocols},
  author={Wenbo Mao and Kenneth G. Paterson},
  year={2002}
}
We present an examination of a design feature named “plausible deniability” which has been widely adopted in key exchange protocols, in particular, in IKEv2 and in signature-based modes of IKE. We expose an authentication flaw in these modes of IKE and IKEv2 which is due in part to the presence of this plausible deniability feature. The flaw is also present in the protocols SIGMA [18] and Σ0, Σ1 [6] from which IKEv2 and parts of IKE have evolved. Although minor, the flaw opens up the… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-10 OF 21 REFERENCES

Efficient, DoS-resistant, secure key exchange for internet protocols

  • ACM Conference on Computer and Communications Security
  • 2002
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer

C. Meadows
  • Proc. IEEE Symposium on Security and Privacy,
  • 1999
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

SKEME: a versatile secure key exchange mechanism for Internet

  • Proceedings of Internet Society Symposium on Network and Distributed Systems Security
  • 1996
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Authenticated Identity-Based Encryption

  • IACR Cryptology ePrint Archive
  • 2002
VIEW 1 EXCERPT